Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

im in over my head and could really use some help! thank you! 9:59 my.cs.coloradotech.edu CSS280 Lab 4 Name 1. Find your IP and the

im in over my head and could really use some help! thank you!
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
9:59 my.cs.coloradotech.edu CSS280 Lab 4 Name 1. Find your IP and the IP of another team member. 1. Run NMAP against Use search to locate the nmap command line executable if needed. Examples of the command are listed below and in the man pages located under very helpful support documents. To first use nmap, one normally needs to navigate to where the program is located with the sequence cd /"program files"map. Start with the TCP option. 1. Are there any services, ports, protocols, etc...that you would disable if they were not in use? Which ones and why? Yes, this requires internet research. 1. What was the command as it appears on the command line that you entered to get your results? If you are using the Windows GUI the command is at the bottom of the window in the status bar pane, otherwise enter the command you issued. 1. Perform an OS identification against the team member's computer. 9:59 my.cs.coloradotech.edu nmap -sT-O 1. How accurate is the operating system estimate of the OS identifier command? Did it identify the right OS? 1. What does the -ST parameter do? 1. Perform a stealth scan against the team member's computer checking for port 135 being active. nmap -sS -PO-p135 1. What does the -p specify? 1. What does the -PO do? 1. What is the difference between a TCP- connect scan and a SYN scan? 1. Discover all computers within the subnet with: 1. nmap -SP-PE 9:59 my.cs.coloradotech.edu 1. What is the -SP option? 1. What is the -PE option? What's the /29 all about? It's called Classless Inter- Domain Routing (CIDR). In this case the /29 says only 8 usable addresses. This is actually a more efficient way of describing networks from the point of conserving IP addresses and you'll see it a lot. A /32 really refers to a unique IP address. Here's a nifty little chart that breaks it down better. CIDR Block Prefix # Equivalent Class C # of Host Addresses /32 1/256th of a Class C 1 host /31 1/128th of a Class C2 hosts /30 1/64th of a Class C 4 hosts 129 1/32th of a Class C 8 hosts /28 1/16th of a Class C 16 hosts /27 1/8th of a Class C 32 hosts 126 1/4th of a Class C 64 hosts /25 1/2 of a Class C 128 hosts /24 1 Class C256 hosts /23 2 Class C 512 hosts 1224 Class C 1,024 hosts /21 8 Class C2,04 bacte 10:00 my.cs.coloradotech.edu /24 1 Class C 256 hosts /23 2 Class C 512 hosts /22 4 Class C 1,024 hosts 121 8 Class C 2,048 hosts /2016 Class C 4,096 hosts /19 32 Class C 8,192 hosts 6. This will scan a single IP address, just change the IP to the one you want. 1. Start WireShark 1. nmap -SP-PA (2 points) 1. What is the -PA option (2 points) but nmap -SP-PA

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Conceptual Database Design An Entity Relationship Approach

Authors: Carol Batini, Stefano Ceri, Shamkant B. Navathe

1st Edition

0805302441, 978-0805302448

More Books

Students also viewed these Databases questions

Question

What is a bottleneck and how does it help manage a process?

Answered: 1 week ago

Question

Differentiate tan(7x+9x-2.5)

Answered: 1 week ago

Question

Explain the sources of recruitment.

Answered: 1 week ago

Question

Differentiate sin(5x+2)

Answered: 1 week ago

Question

Compute the derivative f(x)=1/ax+bx

Answered: 1 week ago